-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Requiring existing resources to be imported / support for timeouts #1746
Conversation
e3ed086
to
bb7edd4
Compare
a322204
to
85c99df
Compare
85c99df
to
4222d53
Compare
a5cd1f9
to
2118514
Compare
Hey @tombuildsstuff Considering that this PR contains so many files (~100), which will have big chance (see below conflicts) to conflict with other merged PRs in the near future. Will it be better to split such kind of mega PR into smaller ones and iterate fast? Just my 2 cents. |
resp, err := client.GetAuthorizationRule(ctx, resourceGroup, namespaceName, topicName, name) | ||
if err != nil { | ||
if !utils.ResponseWasNotFound(resp.Response) { | ||
return fmt.Errorf("Error checking for the existence of Service Bus Topic Rule %q (Resource Group %q / Namespace %q): %+v", name, resourceGroup, namespaceName, err) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
return fmt.Errorf(" [](start = 0, length = 23)
Move this error message as template function in errors
package?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this varies wildly by resource, so this doesn't make sense to refactor out
From the description:
I'm rebasing this PR at least once a day - but unfortunately this needs to be applied to all resources at once since it's a behavioural change. Whilst we could potentially merge this in with a feature flag to disable it, we'd have to modify every file to remove that feature flag at some point anyway, so I don't see that as a beneficial option in this case We don't often have cross-cutting PR's for this reason, but behavioural changes (such as this one, and also #1728) unfortunately sometimes warrant larger PR's so the UX is consistent. |
039d656
to
ed58e57
Compare
473ae48
to
e0d38e4
Compare
9f00ba6
to
00d1be8
Compare
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
Closing this in favour of #2511 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
This PR fixes a couple of cross-resource bugs in the Provider:
This is being done in one hit so it's consistent, rather than being inconsistent across resources.
Resource Support
virtual resources are slightly different:
requires more extensive testing:
needs to be done last / in this order:
other
config.go
azurerm_dns_cname_record
- removing the removedrecords
fieldDependent on Storage: Import Support #1816merged